(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Access Control for Quads in a Graph Store

Publishing Venue

Abstract

Disclosed is a method to control user access to data in a graph store by computing query results based on filtering quads in a graph store when users have access controls in place to view data.

Country

Undisclosed

Language

English (United States)

This text was extracted from a PDF file.

This is the abbreviated version, containing approximately
52% of the total text.

Page 01 of 2

Access Control for Quads in a Graph Store

Clients want to prescribe which users have access to sensitive data in graph stores. Currently available graph stores do not provide any mechanism to restrict access to individual quads (a quad is a graph with a ?s ?p ?o) or datasets (a collection of graphs)

when computing a query result. When users execute queries against a graph store, the system uses all of the data to compute the result set.

Independent of a query engine plan to execute a query, any graph that can be consumed by a query engine to compute the results should have the means by which to restrict access to the graph depending on the requesting user.

Once current process is to iterate through query result sets and remove quads and triples that a specific user CANNOT access. In addition to not performing well, this solution leaves the data is visible after the fact, which can lead to exposure of data to

users who do not have access. This disclosure addresses this issue by restricting the data while computing the result set.

Another possible solution is to rewrite incoming queries to restrict graphs as part of the

query itself.

The novel solution is a method to control user access to data in a graph store.